Skip to main content
Log in

Loss evaluation analysis of illegal attack in SCSKP

  • Methodologies and Application
  • Published:
Soft Computing Aims and scope Submit manuscript

Abstract

It has always been a challenging problem to evaluate the security of cloud services. In this paper, we analyze this problem exploiting the loss expectation by illegal attack in a quantitative way. With one of the key cloud services, storage cloud services based on key–value pairs (SCSKP for short), we quantify the protection ability with the Markov model analysis on the possibilities of various illegal attack. The loss expectation caused by the illegal attack will be calculated based on the analysis and then be used to quantify the resistance ability of SCSKP against such attacks, which serves as a metric to evaluate the security of the cloud service. We provide three series of experiments are exploited to test the expectation of losses. The results show that our method is valid and able to reflect the security situation of the cloud service.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11
Fig. 12
Fig. 13
Fig. 14
Fig. 15

Similar content being viewed by others

References

  • Armbrust M, Fox A, Griffith R et al (2010) A view of cloud computing. Commun ACM 53(4):50–58

    Article  Google Scholar 

  • Arshad J, Tpwnend P, Jie Xu (2013) A novel intrusion severity analysis approach for clouds. Futur Gener Comput Syst 29(1):416–428

    Article  Google Scholar 

  • Calheiros RN, Ranjan R, Beloglazov A, et al. (2011) CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms. Software 41(1):23–50

  • Changqing C, Xiaobin P, Heng Z, Yunsheng L (2011) A semi-markov evaluation model for the survivability of real-time database with intrusion tolerance. Chin J Comput 34(10):1907–1916

    Article  Google Scholar 

  • Fengzhe Z, Jin C, Haibo C, Binyu C (2011) Lifetime privacy and self-destruction of data in the cloud. J Comput Res Dev 48(7):1155–1167

  • Grobauer B, Walloschek T, Stocker E (2011) Understanding cloud computing vulnerabilities. IEEE Secur Priv 9(2):50–57

    Article  Google Scholar 

  • Hu P, Li Z, Peng JK (2011) Application research of distributed firewall based on intrusion detection. Microelectron Comput 28(6):126–130

  • Jianming Z, Raghunathan S (2009) Evaluation model of information security technologies based on game theoretic. Chin J Comput 32(4):828–834

    Article  Google Scholar 

  • Kandukuri BR, Paturi VR, Rakshit A (2009) Cloud security issues[C]. In: Proceedings of 2009 IEEE international conference on services computing 517–520

  • Kun Z, Qingzhong L, Yuliang S (2010) Research on data combination privacy preservation mechanism for saas. Chin J Comput 33(11):2044–2054

    Article  Google Scholar 

  • Morsy MA, Grundy J, Muller I (2010) An analysis of the cloud computing security problem. In: Proceedings of APSEC 2010 Cloud Workshop

  • Pamies-Juarez L, García-López P, Sánchez-Artigas M, Herrera B (2011) Towards the design of optimal data redundancy schemes for heterogeneous cloud storage infrastructures[J]. Comput Netw 55(5):1100–1113

  • Subashini S, Kavitha V (2011) A survey on security issues in service delivery models of cloud computing. J Netw Comput Appl 34(1):1–11

    Article  Google Scholar 

  • Teneyuca D (2011) Internet cloud security: the illusion of inclusion. Inf Secur Tech Rep 16(3–4):102–107

    Article  Google Scholar 

  • Wang L, Laszewski GV, Younge A, He X, Kunze M, Tao J, Fu C (2010) Cloud computing: a perspective study. N Gener Comput 28(2):137–146

    Article  MATH  Google Scholar 

  • X-Scan[DB/OL]. http://www.xfocus.net/projects/X-Scan/index.html, 2005-07-18/2014-10-25

  • Zhang Q, Cheng L, Boutaba R (2010) Cloud computing: state-of-the-art and research challenges. J Intern Serv Appl 1(1):7–18

    Article  Google Scholar 

  • Zissis D, Lekkas D (2012) Addressing cloud computing security issues. Futur Gener Comput Syst 28(3):583–592

    Article  Google Scholar 

Download references

Acknowledgments

This research work was supported by Program for Natural Science Foundation of Jilin Province (20150101054JC), and Key Program for Science and Technology Development of Jilin Province (20130206052GX).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lei Liu.

Additional information

Communicated by V. Loia.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, P., Liu, L., Zhang, R. et al. Loss evaluation analysis of illegal attack in SCSKP. Soft Comput 21, 515–524 (2017). https://doi.org/10.1007/s00500-015-1806-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s00500-015-1806-2

Keywords

Navigation